Watermarking relational Databases using optimization-based techniques

被引:90
|
作者
Shehab, Mohamed
Bertino, Elisa
Ghafoor, Arif
机构
[1] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47906 USA
[3] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
关键词
watermarking; digital rights; optimization;
D O I
10.1109/TKDE.2007.190668
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Proving ownership rights on outsourced relational databases is a crucial issue in today's internet-based application environments and in many content distribution applications. In this paper, we present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. We formulate the watermarking of relational databases as a constrained optimization problem and discuss efficient techniques to solve the optimization problem and to handle the constraints. Our watermarking technique is resilient to watermark synchronization errors because it uses a partitioning approach that does not require marker tuples. Our approach overcomes a major weakness in previously proposed watermarking techniques. Watermark decoding is based on a threshold-based technique characterized by an optimal threshold that minimizes the probability of decoding errors. We implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration, and insertion attacks.
引用
收藏
页码:116 / 129
页数:14
相关论文
共 50 条
  • [21] A novel method of watermarking relational databases using character string
    Zhang, Y
    Niu, XM
    Khan, A
    Li, Q
    Han, Q
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS, 2006, : 120 - +
  • [22] A Persistent Public Watermarking of Relational Databases
    Halder, Raju
    Cortesi, Agostino
    INFORMATION SYSTEMS SECURITY, 2010, 6503 : 216 - 230
  • [23] A public key cryptography based algorithm for watermarking relational databases
    Cui, Haiting
    Cui, Xinchun
    Meng, Mailing
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1344 - 1347
  • [24] Homoglyph transformation based watermarking for XML data in relational databases
    Imamoglu, Mustafa Bilgehan
    Ulutas, Mustafa
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2019, 25 (05): : 586 - 595
  • [25] Optimization-based audio watermarking with integrated quantization embedding
    Chen, Shuo-Tsung
    Huang, Huang-Nan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4735 - 4751
  • [26] Robust Optimization-Based Watermarking Scheme for Sequential Data
    Ayday, Erman
    Yilmaz, Emre
    Yilmaz, Arif
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 323 - 336
  • [27] Optimization-based audio watermarking with integrated quantization embedding
    Shuo-Tsung Chen
    Huang-Nan Huang
    Multimedia Tools and Applications, 2016, 75 : 4735 - 4751
  • [28] Improved method of optimization-based ECG signal watermarking
    Sharma, Nandita
    Singh, Om Prakash
    Anand, Ashima
    Singh, Amit Kumar
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (04)
  • [29] Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation
    Franco-Contreras, Javier
    Coatrieux, Gouenou
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Roux, Christian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (03) : 397 - 410
  • [30] Genetic algorithm and difference expansion based reversible watermarking for relational databases
    Jawad, Khurram
    Khan, Asifullah
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (11) : 2742 - 2753